Wiz Agents & Workflows are here

CVE-2025-23319
Triton Inference Server vulnerability analysis and mitigation

Overview

CVE-2025-23319 is a critical vulnerability discovered in NVIDIA's Triton Inference Server's Python backend affecting both Windows and Linux platforms. The vulnerability was discovered by Ronen Shustin from Wiz Research and disclosed to NVIDIA on May 15, 2025. The issue affects all versions of NVIDIA Triton Inference Server prior to version 25.07 (Wiz Research, NVIDIA Bulletin).

Technical details

The vulnerability is characterized as an out-of-bounds write condition that can be triggered by sending a specially crafted request to the server's Python backend. It has been assigned a CVSS v3.1 base score of 8.1 (High) with the vector string AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is tracked under CWE-805 (Buffer Access with Incorrect Length Value) and involves the server's Inter-Process Communication (IPC) mechanism built on named shared memory (/dev/shm) (Wiz Research, NVD).

Impact

A successful exploitation of this vulnerability can lead to multiple severe consequences including remote code execution, denial of service, data tampering, and information disclosure. In AI/ML environments, this could result in the theft of valuable AI models, exposure of sensitive data being processed by the models, manipulation of AI model responses, and potential lateral movement within the organization's network (Wiz Research, Hacker News).

Mitigation and workarounds

NVIDIA has released version 25.07 of the Triton Inference Server to address this vulnerability. Organizations are strongly advised to upgrade both the NVIDIA Triton Inference Server and the Python backend to this version. Additionally, users deploying Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users only (NVIDIA Bulletin, Wiz Research).

Community reactions

The security community has shown significant concern about this vulnerability due to its potential impact on AI infrastructure. The discovery was part of a larger security research effort by Wiz, which has previously disclosed other NVIDIA vulnerabilities. NVIDIA's security team was praised for their excellent collaboration and swift response to the reported issues (Wiz Research).

Additional resources


SourceThis report was generated using AI

Related Triton Inference Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-24158HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NoYesMar 24, 2026
CVE-2025-33254HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NoYesMar 24, 2026
CVE-2025-33238HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NoYesMar 24, 2026
CVE-2025-33211HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NoYesDec 03, 2025
CVE-2025-33201HIGH7.5
  • Triton Inference ServerTriton Inference Server
  • cpe:2.3:a:nvidia:triton_inference_server
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management